In multiple locations, there is a possible way to bypass KASLR due to an unusual root cause. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.
References
Link | Resource |
---|---|
https://source.android.com/security/bulletin/pixel/2018-06-01 | Patch Vendor Advisory |
Configurations
History
10 Jul 2025, 20:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:google:android:-:*:*:*:*:*:*:* | |
First Time |
Google
Google android |
|
References | () https://source.android.com/security/bulletin/pixel/2018-06-01 - Patch, Vendor Advisory |
15 Mar 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
CWE | CWE-200 |
18 Feb 2025, 21:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : unknown |
CWE |
21 Jan 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.4 |
CWE | CWE-862 | |
Summary |
|
17 Jan 2025, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-17 23:15
Updated : 2025-07-10 20:43
NVD link : CVE-2018-9384
Mitre link : CVE-2018-9384
CVE.ORG link : CVE-2018-9384
JSON object : View
Products Affected
- android
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor